Term 
        
        Why are internal info systems attacks a people problem?  |  
          | 
        
        
        Definition 
        
        Because of the psychological profile of IT employees: 
Tend to be introverts 
Prefer to work independently 
Less likely to handle work stress in constructive manner 
May show disgruntled behavior online rather than by less destructive means
   |  
          | 
        
        
         | 
        
        
        Term 
        
        | Internal Affairs can take the form of ? |  
          | 
        
        
        Definition 
        
        employee theft 
pifredge 
embezzlement
   |  
          | 
        
        
         | 
        
        
        Term 
        
        | Two major causes of employee theft |  
          | 
        
        
        Definition 
        
        Personal problems 
The enviornment  |  
          | 
        
        
         | 
        
        
        Term 
        
        What is the "Formula" for employee they? (Cressey) 
   |  
          | 
        
        
        Definition 
        
        | motivation+opportunity+rationalization=theft |  
          | 
        
        
         | 
        
        
        Term 
        
        Differential association 
(Sutherland)  |  
          | 
        
        
        Definition 
        
        Superiors and colleagues in a company are probably more important determinants of crime than is the personality of the individual 
(Everyone in your work is dishonest, making you want to and do)  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Three ways to remedy internal property theft |  
          | 
        
        
        Definition 
        
        Set up inventory system 
Mark property 
Use metal detectors  |  
          | 
        
        
         | 
        
        
        Term 
        
        | What is a an intergrated system? |  
          | 
        
        
        Definition 
        
        | the control and opporation by a single oporator of multiple systems whose percetption is that only a single system is performing all fuctions. |  
          | 
        
        
         | 
        
        
        Term 
        
        | Types of Biometric security |  
          | 
        
        
        Definition 
        
        fingerprint scan 
hand scan 
iris scan 
retina scan 
voice scan 
physical action and writing 
facial scan  |  
          | 
        
        
         | 
        
        
        Term 
        
        | What is Dual technologies? |  
          | 
        
        
        Definition 
        
        | a combination of different types of intrusion systems |  
          | 
        
        
         | 
        
        
        Term 
        
        | Types of unauthorized entry |  
          | 
        
        
        Definition 
        
        forced entry 
smash and grab attacks 
unforced entry-nonlocked doors 
surrepticious- people hinding in bathrooms 
   |  
          | 
        
        
         | 
        
        
        Term 
        
        | Five countermeasures for external theft |  
          | 
        
        
        Definition 
        
        deter 
detect 
delay 
deny 
destroy  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        Crime prevention through eviornmental protection 
better lighting 
less shrubery 
retrofit buildings  |  
          | 
        
        
         | 
        
        
        Term 
        
        Situational Crime Prevention 
(SCP)  |  
          | 
        
        
        Definition 
        
        | managerial and user behavior factors that affect opportunities for criminal behavior in a specific setting for specific crime |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | individuals calculate outcomes and inputs including the potential pay off, risk and needs |  
          | 
        
        
         | 
        
        
        Term 
        
        | Routine Activities Theory |  
          | 
        
        
        Definition 
        
        | day-to-day activities of people result in the convergeance of motivated offenders and victims |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | focuses on the activity of the victim, as a contributing factor in criminal acts and victimization |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | an outer boundary and the first line of defense against unauthorized acces |  
          | 
        
        
         | 
        
        
        Term 
        
        Five types of barriers that prevent theft 
   |  
          | 
        
        
        Definition 
        
        natural 
structural 
human 
animals 
energy  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Types of protected windows |  
          | 
        
        
        Definition 
        
        laminated glass 
acrylic windows 
burglar resistant 
poly carbonate windows(plexiglass) 
electronic security glass  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Intrusive detection systems |  
          | 
        
        
        Definition 
        
        point detection 
area protection 
perimeter protection  |  
          | 
        
        
         | 
        
        
        Term 
        
        | What are the two major purposes of lighting |  
          | 
        
        
        Definition 
        
        create psychological deterant 
enable detection  |  
          | 
        
        
         | 
        
        
        Term 
        
        three types of light measure 
   |  
          | 
        
        
        Definition 
        
        lumens 
illumenance 
foot candle power  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        activities performed by personel to furter the goals of security and loss prevention 
   |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | manufactured items that increase security |  
          | 
        
        
         | 
        
        
        Term 
        
        | Five rules toward making a wise purchasing decesion |  
          | 
        
        
        Definition 
        
        buyer beware-get what you pay for 
properly evaluate the needs of the organization 
aquire info and know state of the art 
analyze advantages and disadvantages 
avoid panic buying  |  
          | 
        
        
         | 
        
        
        Term 
        
        | client interested in hiring a Loss Prevention Consultant will be involved in 3 specific phases |  
          | 
        
        
        Definition 
        
        Selection 
direction 
evaluation  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | purchasing from outside companies, services that were previously performed in-house |  
          | 
        
        
         | 
        
        
        Term 
        
        | Six basic question to ask during an investigation |  
          | 
        
        
        Definition 
        
        Who 
What 
Where 
When 
How(most important) 
Why  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Types of investigations in the private sector are? |  
          | 
        
        
        Definition 
        
        applicant background 
criminal office 
computer crime 
accidents 
fire and arson 
neglect and civil liability 
insurance 
labor matters 
due dillgence
   |  
          | 
        
        
         | 
        
        
        Term 
        
        | Whats the difference between Overt and Undercover? |  
          | 
        
        
        Definition 
         | 
        
        
         | 
        
        
        Term 
        
        What are the three classifications of evidence 
   |  
          | 
        
        
        Definition 
        
        Direct 
Circumstantial 
Hearsay  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | directly proves of disproves a fact without drawing an inference |  
          | 
        
        
         | 
        
        
        Term 
        
        | What is circumstantial evidence? |  
          | 
        
        
        Definition 
        
        | indirectly proves or disproves a fact and an inference must be made |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | Second-hand information or what someone heard |  
          | 
        
        
         | 
        
        
        Term 
        
        | Know the difference in interrogation and interview |  
          | 
        
        
        Definition 
         | 
        
        
         | 
        
        
        Term 
        
        | Strategies during an interview |  
          | 
        
        
        Definition 
        
        ask open ended questions 
maintain silence 
build up interveiwee memory 
test honesty  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Strategies during interrogations |  
          | 
        
        
        Definition 
        
        discuss seriousness of incident 
request story several times 
appeal to emotions 
point out inconsistancies in statements 
confront the interveiwee with some evidence(false or true)  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
         | 
        
        
         | 
        
        
        Term 
        
        | Investigative leads can include? |  
          | 
        
        
        Definition 
        
        scene of the loss 
evidence 
victim 
motive 
witnesses 
informants  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | act of watching or observing an individual |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | is a pretrial disovery method whereby the oposing party askes quesitons of the other party under oath while a word-for-word transcript is recorded |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | the recording, sorting, summarizing, reporting and interpreting data related to business transactions |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | the examination or checking of something with the purpose of which is to uncover deviations |  
          | 
        
        
         | 
        
        
        Term 
        
        | Importance of accountability |  
          | 
        
        
        Definition 
        
        | key to survival strategies |  
          | 
        
        
         | 
        
        
        Term 
        
        | Private securities litigation reform act |  
          | 
        
        
        Definition 
        
        | requires CPAs who audit publicy help companies to take steps to detect fraud |  
          | 
        
        
         | 
        
        
        Term 
        
        | Two areas that auditors should dilegeantly work to detect |  
          | 
        
        
        Definition 
        
        financial reporting fraud 
missappropriation of assets  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | measuremnt of the frequency probability and severity of lasses from exposure to threats or hazards |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | make the most efficient before the loss arrangement for an after the loss continuation of business |  
          | 
        
        
         | 
        
        
        Term 
        
        | Factors that influence roles of risk management |  
          | 
        
        
        Definition 
        
        top management 
external influences 
nature of business 
copporate developments 
characteristics of risk management  |  
          | 
        
        
         | 
        
        
        Term 
        
        | 5 steps in the risk management process |  
          | 
        
        
        Definition 
        
        risk identification 
quantative analysis 
evaluate treatment options 
implementation 
monitor and adjust  |  
          | 
        
        
         | 
        
        
        Term 
        
        | 5 tools to deal with risk |  
          | 
        
        
        Definition 
        
        risk avoidance 
transfer risk 
risk abatement 
risk spreading 
risk assumption  |  
          | 
        
        
         | 
        
        
        Term 
        
        | insurance rates are dependant of two variables |  
          | 
        
        
        Definition 
        
        frequency of claims 
the cost of each claim 
   |  
          | 
        
        
         | 
        
        
        Term 
        
        | two forms of control for insurance companies |  
          | 
        
        
        Definition 
        
        comptetition among insurance agencies 
government regulations  |  
          | 
        
        
         | 
        
        
        Term 
        
        | two types of prevention against crime losses |  
          | 
        
        
        Definition 
        
        fidelity and surety bond 
burglary, robbery and theft insurance  |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | requires employee to be investigate to limit the risk of dishonesty for the insured |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | agreement providing for compensation if there is a failure to preform specified acts within a certain period of time |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | a legal instrument whereby one party(surety) agrees indermnify another party(the obligee) of the obligee incures a loss from the person bonded(the principle or obligor) |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | a comprehensive managed effore to prioritize key processes, identify signifigant streats to normal operation and plan mitigation strategies to ensure effective and efficient organizational repsonse to the challenges that surface during and after a crises |  
          | 
        
        
         | 
        
        
        Term 
        
        | 7 step methodology for business continuity |  
          | 
        
        
        Definition 
        
        risk assessment report 
business impact analysis report 
disaster recovery plan 
business recovery plan 
business resumption plan 
contingency planning 
crises management  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Five disciplines of emergency management |  
          | 
        
        
        Definition 
        
        mitigation 
response 
recovery 
preparedness 
communications  |  
          | 
        
        
         |